■■□□□ Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware. Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware
All posts by John Doe
May 6, 2025 at 07:33PM
BLINDER: A self-hosted, web-based Blind XSS detection and management tool that delivers real-time notifications via Telegram bot. The program is under 300 lines of code. https://github.com/AamerShah/blinder
May 6, 2025 at 04:28AM
■■■■□ Confirmed — 19 Billion Compromised Passwords Published Online. https://www.forbes.com/sites/daveywinder/2025/05/05/new-warning—19-billion-compromised-passwords-create-hacking-arsenal/
May 5, 2025 at 10:51PM
■■■■■ TeleMessage, a modified Signal clone used by US government officials, has been hacked. TeleMessage, a modified Signal clone used by US government officials, has been hacked
May 4, 2025 at 06:52PM
■□□□□ GISEC – Dubai, a free cyber security event, will kick off from 6 – 9 May. https://gisec.ae/
May 3, 2025 at 08:59PM
■■□□□ Passive port scan without actually sending network traffic to the target using naabu, which uses sata from engines like shodan. echo hackerone.com naabu -passive
May 3, 2025 at 07:26PM
■■■■□ Iran 🇮🇷 | Lemon Sandstorm. An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. https://www.fortinet.com/blog/threat-research/fortiguard-incident-response-team-detects-intrusion-into-middle-east-critical-national-infrastructure PARISITE https://thehackernews.com/2024/08/us-agencies-warn-of-iranian-hacking.html https://thehackernews.com/2025/05/iranian-hackers-maintain-2-year-access.html
May 3, 2025 at 07:22PM
■■□□□ OSINT investigation by New York Times on zJewish (Zionist Jew) attack by Israeli 🇮🇱 forces on United Nations officers and medics from Red Crescent. Summary: Jews wait in ambush for medics, kill them, some of them at point blank range. This followed by dumping the 2 dozen UN personnel in mass grave along with…
May 2, 2025 at 09:27PM
■■■■■ CVE-2025-32433: Critical Telecom Vulnerability: No-Auth SSH and Al-Built Exploit. A critical flaw in Erlang/OTP’s SSH server allows attackers to exploit SSH message handling and execute remote code without authentication. What is Erlang? Erlang is a programming language developed by Ericsson in the ’80s, built for telecom systems. It’s still widely used in core networks…
May 2, 2025 at 09:18PM
■□□□□ Bytedance Proposes Faster Linux Inter-Process Communication With “Run Process As Library”. https://www.phoronix.com/news/Bytedance-Faster-Linux-IPC-RPAL
